CVE-2026-30863: JWT Audience Validation Bypass in Parse Server Authentication Adapters
Vulnerability ID: CVE-2026-30863
CVSS Score: 9.3
Published: 2026-03-09
Parse Server versions prior to 8.6.10 and 9.5.0-alpha.11 contain a critical authentication bypass vulnerability in the Google, Apple, and Facebook authentication adapters. An improper implementation of JSON Web Token (JWT) audience validation allows attackers to utilize tokens issued for third-party applications to authenticate as arbitrary users on the target server. Exploitation requires no privileges and results in full account compromise.
TL;DR
A critical logic flaw in Parse Server's third-party authentication adapters permits attackers to bypass JWT audience checks, enabling cross-application token substitution and unauthorized account access.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-287
- Attack Vector: Network
- CVSS v4.0: 9.3 (Critical)
- EPSS Score: 0.00066
- Impact: High Confidentiality, High Integrity
- Exploit Status: Proof of Concept (PoC) Available
- KEV Status: Not Listed
Affected Systems
- Parse Server Node.js Backend
- Parse Server Google Authentication Adapter
- Parse Server Apple Authentication Adapter
- Parse Server Facebook Authentication Adapter
-
parse-server: < 8.6.10 (Fixed in:
8.6.10) -
parse-server: < 9.5.0-alpha.11 (Fixed in:
9.5.0-alpha.11)
Exploit Details
- GitHub: Proof of Concept demonstrating JWT audience validation bypass in Parse Server.
Mitigation Strategies
- Upgrade Parse Server to patched versions 8.6.10 or 9.5.0-alpha.11.
- Enforce explicit configuration of
clientIdfor Apple and Google adapters. - Monitor authentication endpoints for token audience mismatches.
Remediation Steps:
- Identify the current version of Parse Server running in the environment.
- Update the
parse-serverdependency inpackage.jsonto^8.6.10or later. - Execute
npm installoryarn installto apply the updated package. - Verify that
clientIdandappIdsare explicitly defined in the initialization options for all configured authentication adapters. - Restart the Parse Server process and validate authentication flows.
References
- Parse Server GitHub Security Advisory
- GitHub Pull Request #10113
- NVD Record for CVE-2026-30863
- CVE.org Record for CVE-2026-30863
- Proof of Concept Exploit Repository
Read the full report for CVE-2026-30863 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)